Static task
static1
Behavioral task
behavioral1
Sample
180788834f8b4616fb5c3c8efe22a54e3a03c586a62a4d81915d544ed5495917.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
180788834f8b4616fb5c3c8efe22a54e3a03c586a62a4d81915d544ed5495917.exe
Resource
win10v2004-20220812-en
General
-
Target
180788834f8b4616fb5c3c8efe22a54e3a03c586a62a4d81915d544ed5495917
-
Size
799KB
-
MD5
06d2656a84bfca73dee6495d39499951
-
SHA1
dd89e4eb710f5ac62a5ec26fabdc351e77dbd352
-
SHA256
180788834f8b4616fb5c3c8efe22a54e3a03c586a62a4d81915d544ed5495917
-
SHA512
a567a3602115da8aea206f721b37f447eff9f7f13dd857e7331bbb4da21ce96f3416e7379af30dac2209bffe2c27cb8930d5a985ef2d39360e75a5e538690c42
-
SSDEEP
12288:jjtKubddwNW14nn7+zISKEdEtoXlcdUs0LflndeNXZkOWiQMiEJBxSMi:d/ddh+n7+qoVcdv0tdA2Ji+wU
Malware Config
Signatures
Files
-
180788834f8b4616fb5c3c8efe22a54e3a03c586a62a4d81915d544ed5495917.exe windows x86
5b004ed077a2deeb8e0f92183f44c724
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreatePipe
GetCommandLineA
SetLocalTime
ResumeThread
GetStdHandle
IsBadReadPtr
GetFileAttributesA
GetLocaleInfoA
CreateDirectoryA
ReadConsoleW
HeapSize
GetPriorityClass
WriteFile
ResumeThread
GlobalSize
SuspendThread
GetModuleHandleA
VirtualProtect
DeleteFileA
GetProcessHeap
GetDriveTypeA
user32
SetCursor
DrawIcon
GetWindowLongA
LoadCursorA
PeekMessageA
DestroyMenu
DestroyIcon
wsprintfA
GetWindowTextW
DispatchMessageA
SetRect
GetMessageA
GetWindowLongA
els
DllUnregisterServer
DllGetClassObject
DllUnregisterServer
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE